expand for answer

Candidate Key

A subset of attributes, columns, or fields that can be used to uniquely identify any record in a table.


Similar items:
A specific key from the set of candidate keys that is used as the main differentiator between records. Every record must have a unique value in its primary key field. An attribute that contains values that uniquely identifies the record in which the key exists.
[view]
A form of cryptographic transposition based on arranging plain text in a form that generates columns; then the columns are extracted as the cipher text.
[view]
The number of attributes or columns of a relation.
[view]
A process used to identify vulnerabilities, or weaknesses. It can include both technical means, such as vulnerability scans, and nontechnical means, such as an evaluation or inspection of existing data on threats and vulnerabilities. Examination of information to identify the elements comprising a vulnerability. The systematic examination of systems to determine the adequacy of security measures, identify security deficiencies, and provide data from which to predict the effectiveness of proposed security measures.
[view]
A subset of asymmetric cryptography based on the use of a key pair set consisting of a public key and a private key. Messages encrypted with one key from the pair can be decrypted only with the other key from the same pair.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in